![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.107148 |
Categoría: | Denial of Service |
Título: | Asterisk Open Source and Certified Asterisk RTP Resource Exhaustion DoS Vulnerability |
Resumen: | Asterisk Open Source and Certified Asterisk are prone to a; remote denial of service (DoS) vulnerability.;; This VT has been deprecated since this check is already covered in 'Asterisk RTP Resource; Exhaustion Vulnerability' (OID: 1.3.6.1.4.1.25623.1.0.106239). |
Descripción: | Summary: Asterisk Open Source and Certified Asterisk are prone to a remote denial of service (DoS) vulnerability. This VT has been deprecated since this check is already covered in 'Asterisk RTP Resource Exhaustion Vulnerability' (OID: 1.3.6.1.4.1.25623.1.0.106239). Vulnerability Insight: The overlap dialing feature in chan_sip allows chan_sip to report to a device that the number that has been dialed is incomplete and more digits are required. If this functionality is used with a device that has performed username/password authentication RTP resources are leaked. This occurs because the code fails to release the old RTP resources before allocating new ones in this scenario. If all resources are used then RTP port exhaustion will occur and no RTP sessions are able to be set up. Vulnerability Impact: An attacker can exploit this issue to cause a denial-of-service condition. Affected Software/OS: The following products and versions are vulnerable: Digium Asterisk 13 before 13.11.1 Digium Asterisk 11 before 11.23.1 Digium Certified Asterisk 13 before 13.8-cert3 Digium Certified Asterisk 11 before 11.6-cert1 Solution: Updates are available. Please see the references or vendor advisory for more information. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-7551 Debian Security Information: DSA-3700 (Google Search) http://www.debian.org/security/2016/dsa-3700 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838832 https://issues.asterisk.org/jira/browse/ASTERISK-26272 |
Copyright | Copyright (C) 2017 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |